Searched refs:cipher (Results 126 - 150 of 197) sorted by relevance

12345678

/freebsd-11-stable/crypto/openssl/ssl/
H A Ds23_clnt.c266 SSL_CIPHER *cipher; local
271 cipher = sk_SSL_CIPHER_value(ciphers, i);
272 if (cipher->algorithm_ssl == SSL_SSLV2)
H A Ds2_clnt.c477 * (highest priority) cipher the server sends, otherwise
503 s->session->cipher = sk_SSL_CIPHER_value(prio, i);
539 /* CIPHER **cipher;*/
566 s2n(n, p); /* cipher spec num bytes */
620 i = ssl_put_cipher_by_char(s, sess->cipher, p);
650 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
652 else if (SSL_C_IS_EXPORT(sess->cipher))
H A Ds3_enc.c474 if (s->session->cipher != NULL) {
475 if (s->session->cipher->algorithm_enc == SSL_eNULL)
479 if (s->session->cipher->algorithm_enc == SSL_RC4)
541 bs = EVP_CIPHER_block_size(ds->cipher);
H A Dkssl.c1261 asn1ticket->encdata->cipher->length;
1263 calloc(1, asn1ticket->encdata->cipher->length)) == NULL) {
1266 "Error allocating cipher in krb5ticket.\n");
1271 asn1ticket->encdata->cipher->data,
1272 asn1ticket->encdata->cipher->length);
2105 outl = dec_authent->cipher->length;
2107 (&ciph_ctx, unenc_authent, dec_authent->cipher->data, outl)) {
H A Ds2_srvr.c410 s->session->cipher = cp;
463 is_export = SSL_C_IS_EXPORT(s->session->cipher);
475 * 3 bytes cipher
483 * If the cipher is an export cipher, then the encrypted key bytes
485 * this portion is in |num_encrypted_key_bytes|. If the cipher is not an
486 * export cipher, then the entire key material is encrypted (i.e., clear
496 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) {
637 * get session-id before cipher stuff so we can get out session structure
707 /* Make sure we have at least one cipher i
[all...]
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_atheros.c315 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
319 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
321 wpa_printf(MSG_INFO, "Unable to set group key cipher to %u", v);
507 u_int8_t cipher; local
518 cipher = IEEE80211_CIPHER_WEP;
521 cipher = IEEE80211_CIPHER_TKIP;
524 cipher = IEEE80211_CIPHER_AES_CCM;
528 cipher = IEEE80211_CIPHER_AES_CCM_256;
531 cipher = IEEE80211_CIPHER_AES_GCM;
534 cipher
[all...]
/freebsd-11-stable/sys/dev/cxgbe/crypto/
H A Dt4_crypto.c105 * For block cipher replies, the updated IV is supplied in data[2] and
188 * 'sg_dsgl' is used to describe the destination that cipher
793 * before the cipher/plain text, not after. This is true of
816 * The output buffer consists of the cipher text followed by
865 * cipher/plain text. For decryption requests the hash is
866 * appended after the cipher text.
916 * Any auth-only data before the cipher region is marked as AAD.
917 * Auth-data that overlaps with the cipher region is placed in
1095 * For encryption requests, crd should be the cipher request
1137 * AAD is only permitted before the cipher/plai
1883 struct cryptoini *c, *hash, *cipher; local
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dget_for_creds.c412 cred.enc_part.cipher.data = buf;
413 cred.enc_part.cipher.length = buf_size;
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/
H A Dpk7_smime.c139 /* Check to see if a cipher exists and if so add S/MIME capabilities */
481 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher,
495 if (!PKCS7_set_cipher(p7, cipher)) {
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A De_des3.c281 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
331 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
H A De_des.c236 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
/freebsd-11-stable/usr.sbin/ppp/
H A Dchap_ms.c112 DesEncrypt(u_char *clear, u_char *key, u_char *cipher) argument
119 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, key_schedule, 1);
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls_openssl.c1102 "OpenSSL: Failed to set cipher string '%s'",
1327 return "change cipher spec";
1408 * Parse ServerHello to get the selected cipher suite since OpenSSL does
1438 wpa_printf(MSG_DEBUG, "OpenSSL: Server selected cipher suite 0x%x",
1519 * length since OpenSSL does not expose the new cipher suite and DH
3117 * cipher suites for EAP-TEAP.
3123 "OpenSSL: Enable cipher suites for anonymous EAP-TEAP provisioning: %s",
3990 if (ssl->enc_read_ctx == NULL || ssl->enc_read_ctx->cipher == NULL ||
3994 c = ssl->enc_read_ctx->cipher;
4011 int cipher, diges
5128 const char *cipher; local
5333 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
5540 const SSL_CIPHER *cipher; local
[all...]
H A Dcrypto_linux.c784 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
801 io[0].iov_base = (void *) (cipher + iv_len);
824 os_memcpy(alg_iv->iv, cipher, iv_len);
/freebsd-11-stable/tools/regression/net80211/ccmp/
H A Dtest_ccmp.c526 #define TEST(n,name,cipher,keyix,pn) { \
527 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \
535 int cipher; member in struct:ciphertest
610 if (!ieee80211_crypto_newkey(vap, t->cipher,
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_env.c156 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher) argument
167 cipher, NULL, 0))
940 /* If error or no cipher end of processing */
942 if (!ret || !ec->cipher)
962 ec->cipher = NULL;
H A Dcms_pwri.c110 kekciph = env->encryptedContentInfo->cipher;
122 /* Setup algorithm identifier for cipher */
367 /* Fixup cipher based on AlgorithmIdentifier to set IV etc */
/freebsd-11-stable/crypto/openssl/apps/
H A Dreq.c185 const EVP_CIPHER *cipher = NULL; local
203 cipher = EVP_des_ede3_cbc();
708 cipher = NULL;
710 cipher = NULL;
714 if (!PEM_write_bio_PrivateKey(out, pkey, cipher,
/freebsd-11-stable/contrib/unbound/util/
H A Dnet_help.c96 * @param evp_ctx: the evp cipher context, function sets this.
948 /* if we have sha256, set the cipher list to have no known vulns */
950 log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list");
1477 const EVP_CIPHER *cipher; variable
1482 cipher = EVP_aes_256_cbc();
1483 evp_cipher_length = EVP_CIPHER_iv_length(cipher);
1492 if (EVP_EncryptInit_ex(evp_sctx, cipher, NULL, ticket_keys->aes_key, iv) != 1) {
1550 if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) {
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost_crypt.c6 * OpenSSL interface to GOST 28147-89 cipher functions *
34 /* set/get cipher parameters */
166 /* Sets cipher param from paramset NID. */
303 * block cipher current iv
318 /* Next iv is next block of cipher text */
362 * block cipher current iv
397 /* Control function for gost cipher */
426 /* Set cipher parameters from ASN1 structure */
439 if (!ASN1_OCTET_STRING_set(gcp->iv, ctx->iv, ctx->cipher->iv_len)) {
488 if (len != ctx->cipher
[all...]
/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/
H A Dh_aesctr1.c220 cs.cipher = CRYPTO_AES_CTR;
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_record.c20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
55 data = tls_get_cipher_data(suite->cipher);
68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
70 * Returns: 0 on success (cipher changed), -1 on failure
72 * This function changes TLS record layer to use the new cipher suite
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
92 "cipher");
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_fast.c445 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
551 char cipher[64]; local
555 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
557 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
562 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
/freebsd-11-stable/crypto/openssl/crypto/threads/
H A Dmttest.c130 static char *cipher = NULL; variable
259 if (cipher == NULL && OPENSSL_issetugid() == 0)
260 cipher = getenv("SSL_CIPHER");
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwpas_glue.c236 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
239 wpa_s->pairwise_cipher = cipher;
241 wpa_s->group_cipher = cipher;

Completed in 241 milliseconds

12345678